k8s_openapi/v1_29/api/authorization/v1/
subject_rules_review_status.rs#[derive(Clone, Debug, Default, PartialEq)]
pub struct SubjectRulesReviewStatus {
pub evaluation_error: Option<String>,
pub incomplete: bool,
pub non_resource_rules: Vec<crate::api::authorization::v1::NonResourceRule>,
pub resource_rules: Vec<crate::api::authorization::v1::ResourceRule>,
}
impl crate::DeepMerge for SubjectRulesReviewStatus {
fn merge_from(&mut self, other: Self) {
crate::DeepMerge::merge_from(&mut self.evaluation_error, other.evaluation_error);
crate::DeepMerge::merge_from(&mut self.incomplete, other.incomplete);
crate::merge_strategies::list::atomic(&mut self.non_resource_rules, other.non_resource_rules);
crate::merge_strategies::list::atomic(&mut self.resource_rules, other.resource_rules);
}
}
impl<'de> crate::serde::Deserialize<'de> for SubjectRulesReviewStatus {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
#[allow(non_camel_case_types)]
enum Field {
Key_evaluation_error,
Key_incomplete,
Key_non_resource_rules,
Key_resource_rules,
Other,
}
impl<'de> crate::serde::Deserialize<'de> for Field {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
struct Visitor;
impl<'de> crate::serde::de::Visitor<'de> for Visitor {
type Value = Field;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str("field identifier")
}
fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
Ok(match v {
"evaluationError" => Field::Key_evaluation_error,
"incomplete" => Field::Key_incomplete,
"nonResourceRules" => Field::Key_non_resource_rules,
"resourceRules" => Field::Key_resource_rules,
_ => Field::Other,
})
}
}
deserializer.deserialize_identifier(Visitor)
}
}
struct Visitor;
impl<'de> crate::serde::de::Visitor<'de> for Visitor {
type Value = SubjectRulesReviewStatus;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str("SubjectRulesReviewStatus")
}
fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
let mut value_evaluation_error: Option<String> = None;
let mut value_incomplete: Option<bool> = None;
let mut value_non_resource_rules: Option<Vec<crate::api::authorization::v1::NonResourceRule>> = None;
let mut value_resource_rules: Option<Vec<crate::api::authorization::v1::ResourceRule>> = None;
while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
match key {
Field::Key_evaluation_error => value_evaluation_error = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_incomplete => value_incomplete = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_non_resource_rules => value_non_resource_rules = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Key_resource_rules => value_resource_rules = crate::serde::de::MapAccess::next_value(&mut map)?,
Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
}
}
Ok(SubjectRulesReviewStatus {
evaluation_error: value_evaluation_error,
incomplete: value_incomplete.unwrap_or_default(),
non_resource_rules: value_non_resource_rules.unwrap_or_default(),
resource_rules: value_resource_rules.unwrap_or_default(),
})
}
}
deserializer.deserialize_struct(
"SubjectRulesReviewStatus",
&[
"evaluationError",
"incomplete",
"nonResourceRules",
"resourceRules",
],
Visitor,
)
}
}
impl crate::serde::Serialize for SubjectRulesReviewStatus {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
let mut state = serializer.serialize_struct(
"SubjectRulesReviewStatus",
3 +
self.evaluation_error.as_ref().map_or(0, |_| 1),
)?;
if let Some(value) = &self.evaluation_error {
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "evaluationError", value)?;
}
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "incomplete", &self.incomplete)?;
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "nonResourceRules", &self.non_resource_rules)?;
crate::serde::ser::SerializeStruct::serialize_field(&mut state, "resourceRules", &self.resource_rules)?;
crate::serde::ser::SerializeStruct::end(state)
}
}
#[cfg(feature = "schemars")]
impl crate::schemars::JsonSchema for SubjectRulesReviewStatus {
fn schema_name() -> String {
"io.k8s.api.authorization.v1.SubjectRulesReviewStatus".to_owned()
}
fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on the set of authorizers the server is configured with and any errors experienced during evaluation. Because authorization rules are additive, if a rule appears in a list it's safe to assume the subject has that permission, even if that list is incomplete.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Object))),
object: Some(Box::new(crate::schemars::schema::ObjectValidation {
properties: [
(
"evaluationError".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("EvaluationError can appear in combination with Rules. It indicates an error occurred during rule evaluation, such as an authorizer that doesn't support rule evaluation, and that ResourceRules and/or NonResourceRules may be incomplete.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
..Default::default()
}),
),
(
"incomplete".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("Incomplete is true when the rules returned by this call are incomplete. This is most commonly encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Boolean))),
..Default::default()
}),
),
(
"nonResourceRules".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("NonResourceRules is the list of actions the subject is allowed to perform on non-resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Array))),
array: Some(Box::new(crate::schemars::schema::ArrayValidation {
items: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(__gen.subschema_for::<crate::api::authorization::v1::NonResourceRule>()))),
..Default::default()
})),
..Default::default()
}),
),
(
"resourceRules".to_owned(),
crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
metadata: Some(Box::new(crate::schemars::schema::Metadata {
description: Some("ResourceRules is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, may contain duplicates, and possibly be incomplete.".to_owned()),
..Default::default()
})),
instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Array))),
array: Some(Box::new(crate::schemars::schema::ArrayValidation {
items: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(__gen.subschema_for::<crate::api::authorization::v1::ResourceRule>()))),
..Default::default()
})),
..Default::default()
}),
),
].into(),
required: [
"incomplete".to_owned(),
"nonResourceRules".to_owned(),
"resourceRules".to_owned(),
].into(),
..Default::default()
})),
..Default::default()
})
}
}